Proceedings Fifth IEEE International Symposium on Requirements Engineering

27-31 Aug. 2001

Filter Results

Displaying Results 1 - 25 of 70
  • Proceedings Fifth IEEE International Symposium on Requirements Engineering

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • Requirements for evolving systems: a telecommunications perspective

    Publication Year: 2001, Page(s):2 - 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB)

    In many software application domains, constant evolution is the dominant problem, shaping both software design and the software process. Telecommunication software is the prototypical example of such an application domain. This paper examines how requirements engineering, formal description techniques and formal methods should be adapted to work well in these application domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The hidden meta-requirements of security and privacy

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB)

    When collecting requirements for software, designers may learn of needs for specific forms of protection to be present. These needs may be translated into requirements for encryption or authentication, but what about the non-obvious aspects of security - including privacy, auditability and assurance - that are usually overlooked in the requirements capture process? When we overlook these issues, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practice-based design

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Beginning in the late 1980s, a small cohort of anthropologists and computer scientists at Xerox Palo Alto Research Center developed an interdisciplinary research programme concerned with the design and use of information technologies. Our projects over the years joined ethnographies of work and technologies-in-use with design interventions. This paper briefly reviews this program of research, illu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering and program synthesis: mutually exclusive or synergistic?

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    There has often been a clash within the formal methods community between early life-cycle proponents, such as the requirements engineering community, and late life-cycle proponents, such as the program synthesis community. This paper first characterizes these positions and their underlying assumptions, and then exposes a common set of problems and approaches. The paper then proposes an integrated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Events and constraints: a graphical editor for capturing logic requirements of programs

    Publication Year: 2001, Page(s):14 - 22
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (827 KB) | HTML iconHTML

    A logic model checker can be an effective tool for debugging software applications. A stumbling block can be that model-checking tools expect the user to supply a formal statement of the correctness requirements to be checked in temporal logic. Expressing non-trivial requirements in logic, however, can be challenging. To address this problem, we developed a graphical tool, called the TimeLine Edit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual environment modeling for requirements validation of high consequence systems

    Publication Year: 2001, Page(s):23 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (825 KB) | HTML iconHTML

    An essential type of "evidence" of the correctness of the requirements formalization process can be provided by human-based calculation. Human calculation can be significantly amplified by shifting from symbolic representations to graphical representations. Having a formally-defined system model, we can visualize formulas that represent the functional behavior of the system and associated safety c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metaphors of intent

    Publication Year: 2001, Page(s):31 - 38
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB) | HTML iconHTML

    Current research in cognitive linguistics questions demonstrates that metaphor is pervasive in the understanding and communication of abstractions of all kinds. This has wide-ranging implications for how we describe actual and envisaged information artifacts. Although it is not machinery or mind or mathematics or matter, requirements engineering and design methods must take some metaphorical stanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency management of product line requirements

    Publication Year: 2001, Page(s):40 - 47
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (791 KB) | HTML iconHTML

    Contemporary software engineering utilizes product lines for reducing time to market and development cost of a single product variant, for improving quality of the products, and for creating better estimations of the development process. Most product line development processes rely on performing a domain analysis to find out commonalities among proposed family members and to estimate how they will... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product-line requirements specification (PRS): an approach and case study

    Publication Year: 2001, Page(s):48 - 55
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    Software product-line engineering can provide significant gains in quality and productivity through systematic reuse of software's conceptual structures. For embedded safety- or mission-critical systems, much of the development effort goes into understanding, specifying, and validating the requirements. If developers can reuse rather than re-do requirements for families of similar systems, we can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending the product family approach to support n-dimensional and hierarchical product lines

    Publication Year: 2001, Page(s):56 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (881 KB) | HTML iconHTML

    The software product-line approach (for software product families) is one of the success stories of software reuse. When applied, it can result in cost savings and increases in productivity. In addition, in safety-critical systems the approach has the potential for reuse of analysis and testing results, which can lead to safer systems. Nevertheless, there are times when it seems like a product fam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching ERP system functionality to customer requirements

    Publication Year: 2001, Page(s):66 - 75
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (981 KB) | HTML iconHTML

    Although procuring enterprise resource planning systems from commercial suppliers is becoming increasingly popular in our industry, fitting those systems to customer requirements remains problematic. The authors propose an approach for matching ERP system functionality to customer requirements. The assumption made is that the ERP system postulates a set of requirements that are worth eliciting fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software acquisition: a business strategy analysis

    Publication Year: 2001, Page(s):76 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB) | HTML iconHTML

    The paper argues that there are new insights to be gained from a strategic analysis of requirements engineering. The paper is motivated by a simple question: what does it take to be a world class software acquirer? The question has relevance for requirements engineers because for many organisations market pressures mean that software is commonly acquired rather than developed from scratch. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An industrial survey of requirements interdependencies in software product release planning

    Publication Year: 2001, Page(s):84 - 91
    Cited by:  Papers (28)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB) | HTML iconHTML

    The task of finding an optimal selection of requirements for the next release of a software system is difficult as requirements may depend on each other in complex ways. The paper presents the results from an in-depth study of the interdependencies within 5 distinct sets of requirements, each including 20 high-priority requirements of 5 distinct products from 5 different companies. The results sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving beyond requirements creep: a risk-based evolutionary prototyping model

    Publication Year: 2001, Page(s):94 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (849 KB) | HTML iconHTML

    Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongoing clarification of existing requirements and the discovery of previously missing or unknown requirements. Traditionally, the iterative reexamination of a systems requirements has not been the panacea that practitioners ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will it work? [Requirements engineering]

    Publication Year: 2001, Page(s):102 - 109
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    This paper describes experiences using requirements engineering (RE) to reduce the risk of large heterogeneous distributed systems not working in their intended environments. Industry is creating ever-larger systems by integrating increasingly complex smaller systems. As a result, systems integration is becoming a major, or even dominant, risk in the production of systems such as an aircraft, rail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering for complex collaborative systems

    Publication Year: 2001, Page(s):110 - 117
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB) | HTML iconHTML

    A method for analysing requirements for complex sociotechnical systems is described. The method builds on the I* family of models by explicitly modelling communication between agents by discourse act types. System (i*) models and use cases are developed which describe the dependencies between human and computer agents in terms of a set of discourse acts that characterise the obligations on agents ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain independent regularities in scenarios

    Publication Year: 2001, Page(s):120 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Scenario is a description technique which has attracted much attention not only from practitioners but also from researchers. Literature on this topic shows the possibilities that this description technique provides to enhance the understanding of task-related descriptions and the communication among stakeholders. On the other hand, the idea of pattern, as a description of a problem which occurs o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study of facilitation of computer-mediated distributed requirements negotiations

    Publication Year: 2001, Page(s):128 - 135
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    Group facilitation is an important element of group approaches to requirements engineering (RE). The facilitation in traditional face-to-face groups is challenged by the increased globalization of the software industry. Thorough empirical investigation of human facilitation in computer-mediated requirements meetings is needed. This paper presents findings about the facilitation of distributed grou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of policy and stakeholder privacy values in requirements engineering

    Publication Year: 2001, Page(s):138 - 145
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and collaborative systems should be aware of these effects and acknowledge the need for early privacy planning during the requirements definition activity. Public concerns about the collection of personal information by consumer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating organizational requirements and object oriented modeling

    Publication Year: 2001, Page(s):146 - 153
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB) | HTML iconHTML

    In recent years we have observed a growing influence of the object-oriented paradigm. Unfortunately, the current dominant object oriented modeling technique, i.e. the Unified Modeling Language, UML, is ill equipped for modeling early requirements which are typically informal and often focus on stakeholder objectives. Instead, UML is suitable for later phases of requirement capture which usually fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements modeling for organization networks: a (dis)trust-based approach

    Publication Year: 2001, Page(s):154 - 163
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (938 KB) | HTML iconHTML

    Recently, viewpoint resolution methods which make conflicts productive have gained popularity in requirements engineering for organizational information systems. However, when extending such methods beyond organizational boundaries to social networks, sociological research indicates that a delicate balance of trust in individuals, confidence in the network as a whole, and watchful distrust becomes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML-based method and tool for handling variant requirements in domain models

    Publication Year: 2001, Page(s):166 - 173
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    A domain model describes common and variant requirements for a system family. UML notations used in requirements analysis and software modeling can be extended with variation points to cater for variant requirements. However, UML models for a large single system are already complicated enough. With variants UML domain models soon become too complicated to be useful. The main reasons are the explos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model checking early requirements specifications in Tropos

    Publication Year: 2001, Page(s):174 - 181
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (835 KB) | HTML iconHTML

    We describe an attempt to bridge the gap between early requirements specification and formal methods. In particular, we propose a new specification language, called Formal Tropos, that is founded on the primitive concepts of early requirements frameworks (actor, goal, strategic dependency) (Yu, 1997), but supplements them with a rich temporal specification language. We also extend existing formal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for strengthening state invariants generated from requirements specifications

    Publication Year: 2001, Page(s):182 - 191
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    In earlier work (Jeffords and Heitmeyer, 1998) we developed a fixpoint algorithm for automatically generating state invariants, properties that hold in each reachable state of a state machine model, from state-based requirements specifications. Such invariants are useful both in validating requirements specifications and as auxiliary lemmas in proofs that a requirements specification satisfies oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.